background preloader

Online security

Facebook Twitter

Where's Your Data? Privacy Challenges for IT Leaders — Data Privacy Asia Newsletter. It is also extremely important to factor in the way that data is collected. The ubiquitous use of cloud applications such as Dropbox is still an area of concern, as are networked fax machines which are still in widespread use in small to medium sized business. Key internal and external stakeholders need to be made aware of concerns and related security risks surrounding these methods of gathering data. The question of who exactly has access to the data, not only internally bit also amongst external stakeholders is of particular concern. Doing business with government can be especially challenging due to the rigid requirements that government entities have regarding data requirements.

It is not unknown for government agencies to require clear text messages and email attachments to be used to provide personal information to them. Storage remains at the core of any PIA. Simple questions such as the level of encryption and security controls need to be examined. Backups. Law and Regulation. 1500 companies in over 100 countries hit by malicious Adwind backdoor RAT. More than 1,500 companies in over 100 countries have suffered an infection at the hands of the Adwind Remote Access Tool (RAT). Discovered by researchers at Kaspersky Lab, this new attack campaign suggests that Adwind, a multifunctional backdoor which has targeted more than 450,000 individual users (including Mac lovers) since 2013, has developed a taste for business victims.

The Adwind malware (also known as AlienSpy, Frutas, Unrecom, Sockrat and jRAT) appears particularly drawn to retail and distribution, with approximately one-fifth of this operation's victims falling under that category. But Adwind isn't too picky. It's also preyed upon organizations in the architecture, shipping, construction, insurance, and legal sectors. An attack begins when a business receives an email from what appears to be HSBC, one of the largest banking and finance organizations in the world.

But the attachment contains no such thing. "Instead of instructions, the attachments contain the malware sample. List of data breaches and cyber attacks in February 2017 – IT Governance Blog. Comment chiffrer ses documents et ses répertoires ? | CNIL. Dans le cadre le cadre de votre travail ou chez vous, vous conservez des documents qui peuvent contenir des informations confidentielles qui ne devraient pas être accessibles à tous. Le chiffrement répond à cette problématique. Pourquoi chiffrer ses documents et ses répertoires ? Le chiffrement est une méthode qui consiste à protéger ses documents en les rendant illisibles par toute personne n’ayant pas accès à une clé dite de déchiffrement.

Pour en savoir plus, vous pouvez (re)lire notre fiche Comprendre les grands principes de la cryptologie et du chiffrement. À titre personnel, le chiffrement peut être utile si vous souhaitez conserver des documents confidentiels sur un support qui pourrait être volé (clé USB, ordinateur portable, etc.) ou sur un ordinateur que vous partagez avec des personnes qui ne doivent pas pouvoir y accéder. D’un point de vue professionnel, vous pouvez aussi être concernés : Ça n’arrive pas qu’aux autres !

INFOGRAPHIE | Comment chiffrer ses documents ? Ico bring your own device byod guidance.

Windows 10 issues

Nuisance calls and messages. We have placed cookies on your device to help make this website better. You can use this tool to change your cookie settings. Otherwise, we’ll assume you’re OK to continue. Some of the cookies we use are essential for the site to work. We also use some non-essential cookies to collect information for making reports and to help us improve the site. The cookies collect information in an anonymous form. To control third party cookies, you can also adjust your browser settings. I'm fine with this (One cookie will be set to store your preference) (Ticking this sets a cookie to hide this popup if you then hit close. Information and SettingsAbout this tool. UK's largest online pharmacy fined £130,000 for selling patients' personal data to scammers.

The UK's biggest online pharmacy has been fined £130,000 ($200,000) for selling patients' personal data to scammers who targeted the sick and vulnerable. Pharmacy2U (P2U) was punished by the Information Commissioner's Office (ICO) for offering the names and addresses of people who purchased prescriptions and other remedies from their site through online marketing list company, Alchemy Direct Media. The pharmacy was found to have unlawfully sold the personal data of more than 21,000 NHS patients and P2U customers without informing them beforehand or getting their consent to have the data sold on. The companies which bought the data include Australian Lottery fraudsters who targeted male pensioners who were more likely to have chronic health conditions, a Jersey-based "healthcare supplement" company which was found to have conducted "misleading advertising" and "unauthorised health claims" and a UK charity which used the details to solicit donations for people with learning disabilities.

Solar energy firm receives record fine for automated nuisance calls | UK news. A green energy company which plagued consumers with millions of nuisance phone calls offering ‘free’ solar panels has received a record fine from a Government watchdog for “deliberately and recklessly” breaching marketing regulations. Home Energy & Lifestyle Management Ltd (Helms), based in Glasgow, has been slapped with a £200,000 fine by the Information Commissioner’s Office (ICO) after pestering householders with millions of automated calls on an “industrial scale”.

An ICO investigation found that Helms made over six million calls as part of a massive automated call marketing campaign offering ‘free’ solar panels. It said an organisation should have individuals’ permission – which specifically names the company concerned – in order to make automated calls, yet this was not the case. Helms – an accredited company in the failed Government Green Deal initiative to help people make energy saving improvements to their homes – admitted it didn’t even know what the rules were. Tech Support Scams: a Beginner's Guide. Posted by David Harley on November 26, 2015. Introduction I’ve spent a lot of time over the last few years writing and talking about tech support scams. That is, scams implemented by persuading victims that they need help to deal with a problem on their computer. Perhaps it’s time to rethink what potential victims need to know in order to make them less vulnerable to scammers.

I don’t know how many relatively technically-inexperienced people read this blog, but perhaps the more tech-savvy readers will find it useful to think about how they can raise awareness. Basic scam gambits Often, the scammer claims that the victim’s PC has been hacked, or is infected or affected by viruses or other forms of malware. The classic cold-calling scam works something like this: you get a telephone call from someone telling you that he is from or working with Microsoft, and that your Windows PC has been reported as being compromised in some way.

The CLSID scam gambit The Event Viewer gambit The New Wave. 12-15-2015 Privacy Professor Rebecca Herold. PrivacyProfessor6SecurityandPrivacyThreatsoftheHolidaySeason20152. How to encrypt your entire life in less than an hour. “Only the paranoid survive.” — Andy Grove Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately lead the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson’s disease. When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen. And Grove isn’t the only powerful person urging caution. Even the director of the FBI — the same official who recently paid hackers a million dollars to unlock a shooter’s iPhone — is encouraging everyone to cover their webcams. But you obey the law. Well, law-abiding citizens do have reason to fear. “If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” — Cardinal Richelieu in 1641 In this article, I will show you how you can protect yourself by leveraging state-of-the-art encryption.

Common sense security for everyone Let’s get prepared. Apple users targeted in first known Mac ransomware campaign. CJUE : pour l’avocat général, contraindre à sécuriser un hotspot Wi-Fi est illégal. L’avocat général de la CJUE a rendu ses conclusions dans une affaire importante née en Allemagne. Elle concerne l’éventuelle responsabilité du gestionnaire d’un hotspot Wi-Fi quant aux œuvres mises à disposition par des tiers sur son accès. Le litige est né en 2010 lorsque Sony Music a adressé une mise en demeure à Thomas Mc Fadden, l’exploitant d’une entreprise de sonorisation. Son tort ? Avoir laissé ouvert un accès hotspot sans mot de passe, d’où un tiers a pu mettre à disposition une œuvre du catalogue de la major. L’affaire a rapidement pris un tournant judiciaire, où le gérant a d’abord été la cible d’une injonction et d’une condamnation à des dommages et intérêts.

Un hotspot Wif-Fi même accessoire est protégé contre les actions en responsabilité Les conclusions de l’avocat général, destinées à éclairer la Cour, ont été publiées aujourd’hui. Injonction de cesser ou prévenir une atteinte à un droit Mais quelle peut être très concrètement cette injonction ?